Advanced Design Architecture for Network Intrusion Detection using Data Mining and Network Performance Exploration

Main Article Content

Nareshkumar D. Harale, Dr. B. B. Meshram

Abstract

The primary goal of an Intrusion Detection System (IDS) is to identify intruders and differentiate anomalous network activity from normal one. Intrusion detection has become a significant component of network security administration due to the enormous number of attacks persistently threaten our computer networks and systems. Traditional Network IDS are limited and do not provide a comprehensive solution for these serious problems which are causing the many types security breaches and IT service impacts. They search for potential malicious abnormal activities on the network traffics; they sometimes succeed to find true network attacks and anomalies (true positive). However, in many cases, systems fail to detect malicious network behaviors (false negative) or they fire alarms when nothing wrong in the network (false positive). In accumulation, they also require extensive and meticulous manual processing and interference. Hence applying Data Mining (DM) techniques on the network traffic data is a potential solution that helps in design and develops better efficient intrusion detection systems. Data mining methods have been used build automatic intrusion detection systems. The central idea is to utilize auditing programs to extract set of features that describe each network connection or session, and apply data mining programs to learn that capture intrusive and non-intrusive behavior. In addition, Network Performance Analysis (NPA) is also an effective methodology to be applied for intrusion detection. In this research paper, we discuss DM and NPA Techniques for network intrusion detection and propose that an integration of both approaches have the potential to detect intrusions in networks more effectively and increases accuracy.

Article Details

How to Cite
, N. D. H. . D. B. B. M. (2016). Advanced Design Architecture for Network Intrusion Detection using Data Mining and Network Performance Exploration. International Journal on Recent and Innovation Trends in Computing and Communication, 4(5), 262–269. https://doi.org/10.17762/ijritcc.v4i5.2167
Section
Articles